-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Mon, 13 Sep 2004 17:19:50 +0200
Source: syslog-ng
Binary: syslog-ng
Architecture: source sparc
Version: 1.6.4-2
Distribution: unstable
Urgency: low
Maintainer: SZALAY Attila [EMAIL PROTECTED]
Changed-By: Magosányi Árpád (mag) [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Sat, 12 Jun 2004 23:27:45 +0200
Source: syslog-ng
Binary: syslog-ng
Architecture: source sparc
Version: 1.6.2-4
Distribution: unstable
Urgency: low
Maintainer: SZALAY Attila [EMAIL PROTECTED]
Changed-By: Magosányi Árpád (mag) [EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.7
Date: Sat, 24 Jul 2004 17:45:51 +0200
Source: syslog-ng
Binary: syslog-ng
Architecture: source sparc
Version: 1.6.4-1
Distribution: unstable
Urgency: low
Maintainer: SZALAY Attila [EMAIL PROTECTED]
Changed-By: Magosányi Árpád (mag) [EMAIL
-By: Magosányi Árpád (mag) [EMAIL PROTECTED]
Description:
libzorpll - Low level library functions for Zorp
libzorpll-dbg - Low level library functions for Zorp, debug version
libzorpll-dev - Low level library functions for Zorp, development files
Changes:
zorplibll (2.0.26.24-1) unstable
]
Changed-By: Magosányi Árpád (mag) [EMAIL PROTECTED]
Description:
libzorp2 - The runtime library of Zorp
libzorp2-dev - Development files needed to compile Zorp modules
zorp - An advanced protocol analyzing firewall
zorp-doc - Zorp documentation
zorp-modules - Default proxy modules
Hi!
This is the last part of the saga (for a time at least), as we are
done with all assurance requrements (modulo those concentrating on
ST and PP assurance.)
I hope that at least some of you were listening.
(First I thought there would be some feedback, at least
like stop it, this is boring!,
The page says:
733 release-critical bugs were closed and NONE were opened.
Is it a problem in the script, or there is something I haven't
listen to?
--
GNU GPL: csak tiszta forrsbl
Hi!
The open source development method have a very different
approach to tests from the commercial development method:
Testing is a largely uncoordinated effort, driven by the
individual needs of users. That means that zero to none
evidence is gathered on tests actually ran, and no structured
Hi!
Vulnerability assessment is continously happening. It is a common
estimation that the public sees its results with some two months
delay in average.
Actually the other assurance measures are invented to have as few
facts to be found by AVA, as possible.
AVA_CCA.1 Covert channel analysis
Hi!
We will see here the assurance measures related to life cycle support.
This is an area where Debian shines out even from the other open
source projects.
ALC_DVS.2 Sufficiency of security measures (EAL6, EAL7)
ALC_DVS.2.1D The developer shall produce development security
Hi!
Uups, yesterday I have forgot ACM_SCP.
Today's issue is about ADO.
ACM_SCP.3 Development tools CM coverage (appears at EAL5)
ACM_SCP.3.1D The developer shall provide a list of
configuration items for the TOE.
(dpkg -l)
ACM_SCP.3.1C The list of configuration items shall include the
Hi!
The saga continues. Now we look at the development assurance
measures. Unfortunately this part is where open source is
not good at (not saying that closed source is better).
This is because writing documentation is quite
boring, and ADV is about writing design documentation.
I personally
Hi!
If you are at it, please also arrange that netbase do not depend
on any network daemons. I guess lot of us want to have /etc/services,
but do not want inetd and portmapper.
Thank you.
2003-10-18, szo keltezssel Marco d'Itri ezt rta:
On Oct 18, Andrew Pollock [EMAIL PROTECTED] wrote:
2003-10-15, sze keltezssel Ben Collins ezt rta:
On Tue, Oct 14, 2003 at 10:51:14PM +0200, Magos?nyi ?rp?d wrote:
/etc/zorp is mode 0700 in upstream. In a typical setup, almost
every single file under this directory contains sensitive information:
If the directory is justified, then the
2003-10-15, sze keltezssel Matthew Palmer ezt rta:
It's not as though anyone is going to beat you up because of a Lintian
warning. Are we having my package is cleaner than yours contests? (Maybe
we should, considering some of the crud I've seen in NMUs I've built).
I have always thought
Hi!
Which policy checker should I use?
Lintian apparently does not know about the new policy version.
#194257: lintian: Policy version 3.6.1.0 has been released
Package: lintian; Reported by: Jay Bonci [EMAIL PROTECTED]; 145 days old.
Linda apparently does not know about the new policy version.
Hi!
Please take my apologies for spreading lies.
Linda in sid does check against policy version 3.6.1 .
Which road will you take to make linda fall into testing?
Wait until python2.3 provides python (= 2.3), or change
the dependencies of linda?
Anyway I feel it is a pity that the almost-stable
Hi!
I am asking your advice per policy section 10.9. [*]
/etc/zorp is mode 0700 in upstream. In a typical setup, almost
every single file under this directory contains sensitive information:
firewall rules, cryptographic keys, etc.
I think it justifies a lintian override.
What do you think?
Hi!
In the policy manual there is no mention ofthe Uploader field of
debian/control. (version 3.6.1.0)
In the developers' reference I read:
* Add the co-maintainer's correct maintainer name and address to the
Uploaders field in the global part of the debian/control file
It seemed to me that
19 matches
Mail list logo